Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security policies"
- Status: Free
Georgia Institute of Technology
Skills you'll gain: User Experience Design, Prototyping, User Centered Design, Usability, Requirements Analysis, User Interface (UI), Interaction Design, Usability Testing, User Research
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, File Systems, Routing Protocols, OSI Models, Application Development, Linux Commands, TCP/IP, General Networking, Scripting, MySQL, Data Structures
Skills you'll gain: Debugging, Cybersecurity, Programming Principles, Python Programming, Scripting, Automation, File Management, Data Structures
Google Cloud
Skills you'll gain: Cloud Management, Serverless Computing, Google Cloud Platform, Digital Transformation, Data Governance, Cloud Services, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Cloud Infrastructure, Artificial Intelligence and Machine Learning (AI/ML), Data Strategy, Application Programming Interface (API), Real Time Data, Business Transformation, Artificial Intelligence, Data Management, Hybrid Cloud Computing, Data Warehousing, Cloud Computing, Data Security
Skills you'll gain: Cybersecurity, Technical Support and Services, Information Technology, Network Security, Cyber Security Strategy, Computer Security Awareness Training, Application Security, Security Management
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Security, Cloud Infrastructure, Cloud Platforms, Cloud Computing, Cloud Storage, Infrastructure As A Service (IaaS), Emerging Technologies, Hybrid Cloud Computing, IBM Cloud, Serverless Computing, Virtualization, Microservices, Containerization
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Containerization, Encryption
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Information Systems Security, Computer Security Awareness Training, Risk Management, Vulnerability Assessments, Enterprise Security, Cyber Security Assessment
University of Pennsylvania
Skills you'll gain: Generative AI, Data Ethics, HR Tech, Data Governance, Big Data, Machine Learning, Data Security, Governance, Business Strategy, Human Resources, Organizational Strategy, Credit Risk, Business Transformation, Risk Management, Tensorflow, Personalized Service, Digital Transformation, Data-Driven Decision-Making, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence
Skills you'll gain: IT Infrastructure, Information Systems Security, Computer Networking, Desktop Support, Systems Administration, Network Troubleshooting, Remote Access Systems, Network Security, OSI Models, Package and Software Management, Application Security, Cybersecurity, Disaster Recovery, User Accounts, File Systems, TCP/IP, Lightweight Directory Access Protocols, Computer Hardware, Technical Support, Software Installation
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Threat Management, Malware Protection, Healthcare Industry Knowledge, Encryption, Data Security, Information Privacy, General Data Protection Regulation (GDPR), Digital Communications
University of Minnesota
Skills you'll gain: User Story, Agile Software Development, Software Design Patterns, Design Thinking, Software Development Methodologies, Agile Methodology, Agile Project Management, Process Mapping, Software Engineering, Kanban Principles, Software Development Life Cycle, Application Security, Scrum (Software Development), Object Oriented Design, Software Architecture, Software Quality (SQA/SQC), Requirements Analysis, Application Deployment, Lean Methodologies, Lean Manufacturing
In summary, here are 10 of our most popular security policies courses
- Introduction to User Experience Design :Â Georgia Institute of Technology
- Akamai Network Engineering:Â Akamai Technologies, Inc.
- Automate Cybersecurity Tasks with Python:Â Google
- Google Cloud Digital Leader Training:Â Google Cloud
- Introduction to Cybersecurity Careers:Â IBM
- Introduction to Cloud Computing:Â IBM
- Systems and Application Security:Â ISC2
- Cybersecurity for Business:Â University of Colorado System
- AI For Business:Â University of Pennsylvania
- Soporte de TecnologÃas de la Información de Google: Google